default search action
Inger Anne Tøndel
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j16]Inger Anne Tøndel, Daniela Soares Cruzes, Martin Gilje Jaatun, Guttorm Sindre:
Influencing the security prioritisation of an agile software development project. Comput. Secur. 118: 102744 (2022) - [j15]Inger Anne Tøndel, Daniela Soares Cruzes:
Continuous software security through security prioritisation meetings. J. Syst. Softw. 194: 111477 (2022) - [c49]Inger Anne Tøndel, Gunnar Brataas:
SecureScale: Exploring Synergies between Security and Scalability in Software Development and Operation. EICC 2022: 36-41 - [c48]Gencer Erdogan, Inger Anne Tøndel, Shukun Tokas, Michele Garau, Martin Gilje Jaatun:
Needs and Challenges Concerning Cyber-risk Assessment in the Cyber-physical Smart Grid. ICSOFT 2022: 21-32 - [c47]Gencer Erdogan, Iver Bakken Sperstad, Michele Garau, Oddbjørn Gjerde, Inger Anne Tøndel, Shukun Tokas, Martin Gilje Jaatun:
Adapting Cyber-Risk Assessment for the Planning of Cyber-Physical Smart Grids Based on Industrial Needs. ICSOFT (Selected Papers) 2022: 98-121 - 2021
- [j14]Ravishankar Borgaonkar, Inger Anne Tøndel, Merkebu Zenebe Degefa, Martin Gilje Jaatun:
Improving smart grid security through 5G enabled IoT and edge computing. Concurr. Comput. Pract. Exp. 33(18) (2021) - [c46]Lars Halvdan Flå, Ravishankar Borgaonkar, Inger Anne Tøndel, Martin Gilje Jaatun:
Tool-assisted Threat Modeling for Smart Grid Cyber Security. CyberSA 2021: 1-8 - [c45]Gunnar Brataas, Inger Anne Tøndel, Eivind Okstad, Ola Løkberg, Martin Gilje Jaatun, Geir Kjetil Hanssen, Thor Myklebust:
The Quality Triage Method: Quickly Identifying User Stories with Quality Risks. SA 2021: 1-7 - [c44]Inger Anne Tøndel, Hanne Vefsnmo, Oddbjørn Gjerde, Frode Johannessen, Christian Frøystad:
Hunting Dependencies: Using Bow-Tie for Combined Analysis of Power and Cyber Security. SA 2021: 1-8 - 2020
- [j13]Inger Anne Tøndel, Martin Gilje Jaatun, Daniela Soares Cruzes:
IT Security Is From Mars, Software Security Is From Venus. IEEE Secur. Priv. 18(4): 48-54 (2020) - [j12]Inger Anne Tøndel, Martin Gilje Jaatun:
Towards a Conceptual Framework for Security Requirements Work in Agile Software Development. Int. J. Syst. Softw. Secur. Prot. 11(1): 33-62 (2020) - [c43]Inger Anne Tøndel, Ravishankar Borgaonkar, Martin Gilje Jaatun, Christian Frøystad:
What Could Possibly Go Wrong? Smart Grid Misuse Case Scenarios. Cyber Security 2020: 1-8 - [c42]Inger Anne Tøndel, Daniela Soares Cruzes, Martin Gilje Jaatun:
Achieving "Good Enough" Software Security: The Role of Objectivity. EASE 2020: 360-365 - [c41]Inger Anne Tøndel, Daniela Soares Cruzes, Martin Gilje Jaatun:
Using Situational and Narrative Analysis for Investigating the Messiness of Software Security. ESEM 2020: 27:1-27:6
2010 – 2019
- 2019
- [j11]Inger Anne Tøndel, Martin Gilje Jaatun, Daniela Soares Cruzes, Laurie A. Williams:
Collaborative security risk estimation in agile software development. Inf. Comput. Secur. 27(4) (2019) - [c40]Inger Anne Tøndel, Daniela Soares Cruzes, Martin Gilje Jaatun, Kalle Rindell:
The Security Intention Meeting Series as a way to increase visibility of software security decisions in agile development projects. ARES 2019: 59:1-59:8 - 2018
- [j10]Christian Frøystad, Inger Anne Tøndel, Martin Gilje Jaatun:
Security Incident Information Exchange for Cloud Service Provisioning Chains. Cryptogr. 2(4): 41 (2018) - [j9]Martin Gilje Jaatun, Åsmund Ahlmann Nyre, Inger Anne Tøndel:
A Secure MANET Routing Protocol for Crisis Situations. Int. J. Syst. Softw. Secur. Prot. 9(4): 17-45 (2018) - [j8]Martin Gilje Jaatun, Inger Anne Tøndel, Nils Brede Moe, Daniela Soares Cruzes, Karin Bernsmed, Børge Haugset:
Accountability Requirements in the Cloud Provider Chain. Symmetry 10(4): 124 (2018) - [c39]Daniela Soares Cruzes, Martin Gilje Jaatun, Karin Bernsmed, Inger Anne Tøndel:
Challenges and Experiences with Applying Microsoft Threat Modeling in Agile Development Projects. ASWEC 2018: 111-120 - [c38]Inger Anne Tøndel, Martin Gilje Jaatun, Daniela S. Cruzes, Tosin Daniel Oyetoyan:
Understanding Challenges to Adoption of the Protection Poker Software Security Game. CyberICPS/SECPRE@ESORICS 2018: 153-172 - [c37]Inger Anne Tøndel, Tosin Daniel Oyetoyan, Martin Gilje Jaatun, Daniela S. Cruzes:
Understanding challenges to adoption of the Microsoft elevation of privilege game. HotSoS 2018: 2:1-2:10 - 2017
- [j7]Inger Anne Tøndel, Martin Gilje Jaatun, Daniela Soares Cruzes, Nils Brede Moe:
Risk Centric Activities in Secure Software Development in Public Organisations. Int. J. Secur. Softw. Eng. 8(4): 1-30 (2017) - [c36]Martin Gilje Jaatun, Inger Anne Tøndel, Nils Brede Moe, Daniela Soares Cruzes, Karin Bernsmed, Børge Haugset:
Accountability Requirements for the Cloud. CloudCom 2017: 375-382 - [c35]Per Håkon Meland, Inger Anne Tøndel, Marie Elisabeth Gaup Moe, Fredrik Seehusen:
Facing Uncertainty in Cyber Insurance Policies. STM 2017: 89-100 - 2016
- [j6]Maria Bartnes Line, Inger Anne Tøndel, Martin Gilje Jaatun:
Current practices and challenges in industrial control organizations regarding information security incident management - Does size matter? Information security incident management in large and small industrial control organizations. Int. J. Crit. Infrastructure Prot. 12: 12-26 (2016) - [c34]Inger Anne Tøndel, Fredrik Seehusen, Erlend Andreas Gjære, Marie Elisabeth Gaup Moe:
Differentiating Cyber Risk of Insurance Customers: The Insurance Company Perspective. CD-ARES 2016: 175-190 - [c33]Martin Gilje Jaatun, Maria Bartnes, Inger Anne Tøndel:
Zebras and Lions: Better Incident Handling Through Improved Cooperation. I4CS 2016: 129-139 - [c32]Christian Frøystad, Erlend Andreas Gjære, Inger Anne Tøndel, Martin Gilje Jaatun:
Security Incident Information Exchange for Cloud Services. IoTBD 2016: 391-398 - [c31]Martin Gilje Jaatun, Inger Anne Tøndel:
Playing Protection Poker for Practical Software Security. PROFES 2016: 679-682 - 2015
- [j5]Per Håkon Meland, Inger Anne Tøndel, Bjørnar Solhaug:
Mitigating Risk with Cyberinsurance. IEEE Secur. Priv. 13(6): 38-43 (2015) - [c30]Martin Gilje Jaatun, Inger Anne Tøndel:
How Much Cloud Can You Handle? ARES 2015: 467-473 - [c29]Inger Anne Tøndel, Maria B. Line, Gorm Johansen:
Assessing Information Security Risks of AMI - What Makes it so Difficult?. ICISSP 2015: 56-63 - [c28]Martin Gilje Jaatun, Daniela S. Cruzes, Karin Bernsmed, Inger Anne Tøndel, Lillian Røstad:
Software Security Maturity in Public Organisations. ISC 2015: 120-138 - 2014
- [j4]Inger Anne Tøndel, Maria B. Line, Martin Gilje Jaatun:
Information security incident management: Current practice as reported in the literature. Comput. Secur. 45: 42-57 (2014) - [c27]Maria B. Line, Inger Anne Tøndel, Martin Gilje Jaatun:
Information Security Incident Management: Planning for Failure. IMF 2014: 47-61 - 2013
- [c26]Martin Gilje Jaatun, Inger Anne Tøndel, Geir M. Køien:
GPRS Security for Smart Meters. CD-ARES 2013: 195-207 - [c25]Inger Anne Tøndel, Bodil Aamnes Mostue, Martin Gilje Jaatun, Gerd H. Kjølle:
Towards Improved Understanding and Holistic Management of the Cyber Security Challenges in Power Transmission Systems. CD-ARES 2013: 240-255 - [c24]Karin Bernsmed, Inger Anne Tøndel:
Forewarned is Forearmed: Indicators for Evaluating Information Security Incident Management. IMF 2013: 3-14 - 2012
- [c23]Karin Bernsmed, Inger Anne Tøndel, Åsmund Ahlmann Nyre:
Design and Implementation of a CBR-based Privacy Agent. ARES 2012: 317-326 - [c22]Inger Anne Tøndel, Martin Gilje Jaatun, Maria Bartnes Line:
Threat Modeling of AMI. CRITIS 2012: 264-275 - 2011
- [c21]Maria B. Line, Inger Anne Tøndel, Erlend Andreas Gjære:
A Risk-Based Evaluation of Group Access Control Approaches in a Healthcare Setting. ARES 2011: 26-37 - [c20]Inger Anne Tøndel, Åsmund Ahlmann Nyre, Karin Bernsmed:
Learning Privacy Preferences. ARES 2011: 621-626 - [c19]Inger Anne Tøndel, Åsmund Ahlmann Nyre:
Towards a Similarity Metric for Comparing Machine-Readable Privacy Policies. iNetSeC 2011: 89-103 - [c18]Maria B. Line, Inger Anne Tøndel, Martin Gilje Jaatun:
Cyber security challenges in Smart Grids. ISGT Europe 2011: 1-8 - [c17]Erlend Andreas Gjære, Inger Anne Tøndel, Maria B. Line, Herbjørn Andresen, Pieter J. Toussaint:
Personal Health Information on Display: Balancing Needs, Usability and Legislative Requirements. MIE 2011: 606-610 - [c16]Inger Anne Tøndel:
Visualization Control for Event-Based Public Display Systems Used in a Hospital Setting. NordSec 2011: 240-255 - 2010
- [c15]Inger Anne Tøndel, Jostein Jensen, Lillian Røstad:
Combining Misuse Cases with Attack Trees and Security Activity Models. ARES 2010: 438-445 - [c14]Per Håkon Meland, Inger Anne Tøndel, Jostein Jensen:
Idea: Reusability of Threat Models - Two Approaches with an Experimental Evaluation. ESSoS 2010: 114-122 - [c13]Jostein Jensen, Inger Anne Tøndel, Per Håkon Meland:
Experimental Threat Model Reuse with Misuse Case Diagrams. ICICS 2010: 355-366
2000 – 2009
- 2009
- [j3]Martin Gilje Jaatun, Eirik Albrechtsen, Maria B. Line, Inger Anne Tøndel, Odd Helge Longva:
A framework for incident response management in the petroleum industry. Int. J. Crit. Infrastructure Prot. 2(1-2): 26-37 (2009) - [c12]Jostein Jensen, Inger Anne Tøndel, Martin Gilje Jaatun, Per Håkon Meland, Herbjørn Andresen:
Reusable Security Requirements for Healthcare Applications. ARES 2009: 380-385 - [c11]Vegar Westerlund, Thomas Pronstad, Inger Anne Tøndel, Leendert W. M. Wienhofen:
Trusting User Defined Context in MANETs: Experience from the MIDAS Approach. ARES 2009: 681-686 - [c10]Per Håkon Meland, Shanai Ardi, Jostein Jensen, Erkuden Rios, Txus Sanchez, Nahid Shahmehri, Inger Anne Tøndel:
An Architectural Foundation for Security Model Sharing and Reuse. ARES 2009: 823-828 - [c9]Arild Faxvaag, Lillian Røstad, Inger Anne Tøndel, Andreas R. Seim, Pieter J. Toussaint:
Visualizing Patient Trajectories on Wall-Mounted Boards - Information Security Challenges. MIE 2009: 715-719 - 2008
- [j2]Lillian Røstad, Inger Anne Tøndel, Per Håkon Meland, Gunnar René Øie:
Learning by Failing (and Fixing). IEEE Secur. Priv. 6(4): 54-56 (2008) - [j1]Inger Anne Tøndel, Martin Gilje Jaatun, Per Håkon Meland:
Security Requirements for the Rest of Us: A Survey. IEEE Softw. 25(1): 20-27 (2008) - [c8]Martin Gilje Jaatun, Inger Anne Tøndel:
Covering Your Assets in Software Engineering. ARES 2008: 1172-1179 - [c7]Martin Gilje Jaatun, Eirik Albrechtsen, Maria B. Line, Stig Ole Johnsen, Irene Wærø, Odd Helge Longva, Inger Anne Tøndel:
A Study of Information Security Practice in a Critical Infrastructure Application. ATC 2008: 527-539 - [c6]Maria B. Line, Eirik Albrechtsen, Martin Gilje Jaatun, Inger Anne Tøndel, Stig Ole Johnsen, Odd Helge Longva, Irene Wærø:
A Structured Approach to Incident Response Management in the Oil and Gas Industry. CRITIS 2008: 235-246 - [c5]Inger Anne Tøndel, Martin Gilje Jaatun, Jostein Jensen:
Learning from Software Security Testing. ICST Workshops 2008: 286-294 - 2007
- [c4]Shanai Ardi, David Byers, Per Håkon Meland, Inger Anne Tøndel, Nahid Shahmehri:
How can the developer benefit from security modeling? ARES 2007: 1017-1025 - [c3]Gunnar René Øie, Herbjørn Andresen, Inger Anne Tøndel:
Handling Consent to Patient Data Access in a Hospital Setting. MedInfo 2007: 242-246 - 2006
- [c2]Inger Anne Tøndel:
Improving Availability of Emergency Health Information without Sacrificing Patient Privacy. SEC 2006: 1-12 - [c1]Martin Gilje Jaatun, Inger Anne Tøndel, Frédéric Paint, Tor Hjalmar Johannessen, John Charles Francis, Claire Duranton:
Secure Fast Handover in an Open Broadband Access Network using Kerberos-style Tickets. SEC 2006: 389-400
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint